Towards a Unified Security Model for Physically Unclonable Functions

@article{Armknecht2016TowardsAU,
  title={Towards a Unified Security Model for Physically Unclonable Functions},
  author={Frederik Armknecht and D. Moriyama and A. Sadeghi and M. Yung},
  journal={IACR Cryptol. ePrint Arch.},
  year={2016},
  volume={2016},
  pages={33}
}
The use of Physically Unclonable Functions PUFs in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to specific types of applications or specific PUF instantiations. For the sake of applicability, composability, and comparability, however, there… Expand
31 Citations

Figures, Tables, and Topics from this paper

PUFs: Standardization and Evaluation
  • 6
  • PDF
Erasable PUFs: Formal Treatment and Generic Design
  • PDF
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
  • 6
  • Highly Influenced
  • PDF
On the learnability of physically unclonable functions
  • 7
  • PDF
Having no mathematical model may not secure PUFs
  • 16
...
1
2
3
4
...

References

SHOWING 1-10 OF 33 REFERENCES
Physically Uncloneable Functions in the Universal Composition Framework
  • 118
  • Highly Influential
  • PDF
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II
  • 50
  • PDF
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
  • 54
  • PDF
A Formalization of the Security Features of Physical Functions
  • 132
Modeling attacks on physical unclonable functions
  • 673
  • PDF
PUFs in Security Protocols: Attack Models and Security Evaluations
  • 99
  • PDF
Strong Authentication with Physical Unclonable Functions
  • P. Tuyls, B. Škorić
  • Computer Science
  • Security, Privacy, and Trust in Modern Data Management
  • 2007
  • 82
Physically Unclonable Functions: Constructions, Properties and Applications
  • 185
  • Highly Influential
  • PDF
...
1
2
3
4
...